@zerothreatai/vulnerability-registry 3.0.0 → 5.0.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist/categories/authentication.js +34 -17
- package/dist/categories/configuration.js +561 -60
- package/dist/categories/injection.js +68 -34
- package/dist/categories/sensitive-paths.js +168 -84
- package/dist/categories/ssrf.js +22 -11
- package/dist/categories/xss.js +30 -15
- package/dist/category.d.ts +6 -0
- package/dist/category.js +15 -0
- package/dist/error-codes.d.ts +20 -0
- package/dist/error-codes.js +20 -0
- package/dist/index.d.ts +9 -1
- package/dist/index.js +5 -1
- package/dist/scanner.d.ts +6 -0
- package/dist/scanner.js +22 -0
- package/dist/types.d.ts +2 -0
- package/dist-cjs/categories/authentication.js +34 -17
- package/dist-cjs/categories/configuration.js +561 -60
- package/dist-cjs/categories/injection.js +68 -34
- package/dist-cjs/categories/sensitive-paths.js +168 -84
- package/dist-cjs/categories/ssrf.js +22 -11
- package/dist-cjs/categories/xss.js +30 -15
- package/dist-cjs/category.js +18 -0
- package/dist-cjs/error-codes.js +20 -0
- package/dist-cjs/index.js +7 -1
- package/dist-cjs/scanner.js +25 -0
- package/package.json +35 -32
- package/scripts/assign-ids.ts +105 -0
- package/scripts/check-duplicate-ids.ts +45 -0
- package/src/categories/authentication.ts +145 -128
- package/src/categories/configuration.ts +1632 -1111
- package/src/categories/injection.ts +158 -124
- package/src/categories/sensitive-paths.ts +168 -84
- package/src/categories/ssrf.ts +22 -11
- package/src/categories/xss.ts +30 -15
- package/src/category.ts +16 -0
- package/src/error-codes.ts +25 -5
- package/src/id-registry.json +1235 -0
- package/src/index.ts +20 -14
- package/src/scanner.ts +23 -0
- package/src/types.ts +4 -2
- package/zerothreatai-vulnerability-registry-4npm .0.0.tgz +0 -0
- package/src/categories/authentication.d.ts +0 -8
- package/src/categories/authentication.d.ts.map +0 -1
- package/src/categories/authentication.js +0 -378
- package/src/categories/authentication.js.map +0 -1
- package/src/categories/configuration.d.ts +0 -8
- package/src/categories/configuration.d.ts.map +0 -1
- package/src/categories/configuration.js +0 -906
- package/src/categories/configuration.js.map +0 -1
- package/src/categories/injection.d.ts +0 -8
- package/src/categories/injection.d.ts.map +0 -1
- package/src/categories/injection.js +0 -750
- package/src/categories/injection.js.map +0 -1
- package/src/categories/sensitive-paths.d.ts +0 -9
- package/src/categories/sensitive-paths.d.ts.map +0 -1
- package/src/categories/sensitive-paths.js +0 -1791
- package/src/categories/sensitive-paths.js.map +0 -1
- package/src/categories/ssrf.d.ts +0 -8
- package/src/categories/ssrf.d.ts.map +0 -1
- package/src/categories/ssrf.js +0 -250
- package/src/categories/ssrf.js.map +0 -1
- package/src/categories/xss.d.ts +0 -7
- package/src/categories/xss.d.ts.map +0 -1
- package/src/categories/xss.js +0 -328
- package/src/categories/xss.js.map +0 -1
- package/src/error-codes.d.ts +0 -242
- package/src/error-codes.d.ts.map +0 -1
- package/src/error-codes.js +0 -315
- package/src/error-codes.js.map +0 -1
- package/src/index.d.ts +0 -60
- package/src/index.d.ts.map +0 -1
- package/src/index.js +0 -107
- package/src/index.js.map +0 -1
- package/src/types.d.ts +0 -86
- package/src/types.d.ts.map +0 -1
- package/src/types.js +0 -7
- package/src/types.js.map +0 -1
|
@@ -13,11 +13,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
13
13
|
// CRITICAL - CREDENTIAL EXPOSURE
|
|
14
14
|
// ========================================
|
|
15
15
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS]: {
|
|
16
|
-
id:
|
|
16
|
+
id: 500,
|
|
17
17
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_AWS_CREDENTIALS,
|
|
18
18
|
title: 'AWS Credentials Exposed',
|
|
19
19
|
description: 'AWS credentials file (.aws/credentials) is publicly accessible containing AWS Access Key ID and Secret Access Key, enabling complete access to AWS services including S3 buckets, EC2 instances, RDS databases, and all cloud resources associated with the compromised account.',
|
|
20
20
|
severity: 'critical',
|
|
21
|
+
levelId: 1,
|
|
21
22
|
category: 'information_disclosure',
|
|
22
23
|
scanner: 'sensitive-path-scout',
|
|
23
24
|
cvss: {
|
|
@@ -35,11 +36,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
35
36
|
remediation: 'Immediately rotate all exposed AWS credentials. Remove credentials from web-accessible paths. Use IAM roles for EC2 instances. Implement AWS Secrets Manager for credential storage.',
|
|
36
37
|
},
|
|
37
38
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY]: {
|
|
38
|
-
id:
|
|
39
|
+
id: 501,
|
|
39
40
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSH_PRIVATE_KEY,
|
|
40
41
|
title: 'SSH Private Key Exposed',
|
|
41
42
|
description: 'SSH private key file (id_rsa, id_ed25519) is publicly accessible, allowing attackers to authenticate to any system where the corresponding public key is authorized, potentially including production servers, databases, and version control systems.',
|
|
42
43
|
severity: 'critical',
|
|
44
|
+
levelId: 1,
|
|
43
45
|
category: 'information_disclosure',
|
|
44
46
|
scanner: 'sensitive-path-scout',
|
|
45
47
|
cvss: {
|
|
@@ -56,11 +58,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
56
58
|
remediation: 'Immediately revoke and regenerate all SSH key pairs. Remove key files from web-accessible paths. Audit authorized_keys on all systems. Block access to .ssh directories in web server config.',
|
|
57
59
|
},
|
|
58
60
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY]: {
|
|
59
|
-
id:
|
|
61
|
+
id: 502,
|
|
60
62
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_SSL_PRIVATE_KEY,
|
|
61
63
|
title: 'SSL/TLS Private Key Exposed',
|
|
62
64
|
description: 'SSL/TLS private key file is publicly accessible, enabling attackers to decrypt all HTTPS traffic, perform man-in-the-middle attacks, and impersonate the server for phishing or credential theft operations against legitimate users.',
|
|
63
65
|
severity: 'critical',
|
|
66
|
+
levelId: 1,
|
|
64
67
|
category: 'cryptographic',
|
|
65
68
|
scanner: 'sensitive-path-scout',
|
|
66
69
|
cvss: {
|
|
@@ -77,11 +80,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
77
80
|
remediation: 'Immediately revoke the SSL certificate and generate new key pair. Remove private keys from web-accessible directories. Store keys outside webroot with restricted permissions.',
|
|
78
81
|
},
|
|
79
82
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY]: {
|
|
80
|
-
id:
|
|
83
|
+
id: 503,
|
|
81
84
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_RAILS_MASTER_KEY,
|
|
82
85
|
title: 'Rails Master Key Exposed',
|
|
83
86
|
description: 'Rails master.key file is publicly accessible, allowing decryption of all Rails encrypted credentials including database passwords, API keys, and session secrets, enabling complete application compromise and access to all encrypted secrets.',
|
|
84
87
|
severity: 'critical',
|
|
88
|
+
levelId: 1,
|
|
85
89
|
category: 'information_disclosure',
|
|
86
90
|
scanner: 'sensitive-path-scout',
|
|
87
91
|
cvss: {
|
|
@@ -98,11 +102,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
98
102
|
remediation: 'Regenerate Rails master key immediately. Rotate all credentials encrypted with the old key. Remove master.key from version control and web-accessible paths. Use environment variables.',
|
|
99
103
|
},
|
|
100
104
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE]: {
|
|
101
|
-
id:
|
|
105
|
+
id: 504,
|
|
102
106
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_TERRAFORM_STATE,
|
|
103
107
|
title: 'Terraform State File Exposed',
|
|
104
108
|
description: 'Terraform state file (tfstate) is publicly accessible containing complete infrastructure configuration, resource IDs, IP addresses, and potentially sensitive outputs including database passwords and API keys stored in plain text.',
|
|
105
109
|
severity: 'critical',
|
|
110
|
+
levelId: 1,
|
|
106
111
|
category: 'information_disclosure',
|
|
107
112
|
scanner: 'sensitive-path-scout',
|
|
108
113
|
cvss: {
|
|
@@ -119,11 +124,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
119
124
|
remediation: 'Remove state files from web-accessible paths. Use remote state backends (S3, GCS, Azure) with encryption. Rotate any credentials found in state file. Enable state encryption.',
|
|
120
125
|
},
|
|
121
126
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG]: {
|
|
122
|
-
id:
|
|
127
|
+
id: 505,
|
|
123
128
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_KUBE_CONFIG,
|
|
124
129
|
title: 'Kubernetes Config Exposed',
|
|
125
130
|
description: 'Kubernetes kubeconfig file is publicly accessible containing cluster credentials, certificates, and tokens that allow full administrative access to Kubernetes clusters including ability to deploy, modify, and delete all workloads.',
|
|
126
131
|
severity: 'critical',
|
|
132
|
+
levelId: 1,
|
|
127
133
|
category: 'information_disclosure',
|
|
128
134
|
scanner: 'sensitive-path-scout',
|
|
129
135
|
cvss: {
|
|
@@ -140,11 +146,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
140
146
|
remediation: 'Immediately revoke exposed service account tokens and certificates. Rotate cluster credentials. Remove config from web paths. Use RBAC with minimal permissions.',
|
|
141
147
|
},
|
|
142
148
|
[error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET]: {
|
|
143
|
-
id:
|
|
149
|
+
id: 506,
|
|
144
150
|
code: error_codes_js_1.VulnerabilityCode.SENS_CRIT_VAULT_SECRET,
|
|
145
151
|
title: 'HashiCorp Vault Secret Exposed',
|
|
146
152
|
description: 'HashiCorp Vault secrets or root token exposed, providing access to the centralized secrets management system and all secrets stored within, potentially compromising hundreds of application credentials and encryption keys.',
|
|
147
153
|
severity: 'critical',
|
|
154
|
+
levelId: 1,
|
|
148
155
|
category: 'information_disclosure',
|
|
149
156
|
scanner: 'sensitive-path-scout',
|
|
150
157
|
cvss: {
|
|
@@ -164,11 +171,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
164
171
|
// HIGH - SOURCE CODE & CONFIG EXPOSURE
|
|
165
172
|
// ========================================
|
|
166
173
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED]: {
|
|
167
|
-
id:
|
|
174
|
+
id: 507,
|
|
168
175
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GIT_EXPOSED,
|
|
169
176
|
title: 'Git Repository Exposed',
|
|
170
177
|
description: 'Git repository metadata (.git/HEAD, .git/config) is publicly accessible, allowing attackers to download the complete repository including all source code, commit history, configuration files, and potentially credentials committed accidentally.',
|
|
171
178
|
severity: 'high',
|
|
179
|
+
levelId: 2,
|
|
172
180
|
category: 'information_disclosure',
|
|
173
181
|
scanner: 'sensitive-path-scout',
|
|
174
182
|
cvss: {
|
|
@@ -185,11 +193,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
185
193
|
remediation: 'Block access to .git directory in web server configuration. Remove .git from production deployments. Audit git history for accidentally committed secrets.',
|
|
186
194
|
},
|
|
187
195
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE]: {
|
|
188
|
-
id:
|
|
196
|
+
id: 508,
|
|
189
197
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ENV_FILE,
|
|
190
198
|
title: 'Environment File Exposed',
|
|
191
199
|
description: 'Environment configuration file (.env, .env.local, .env.production) is publicly accessible containing application secrets, database credentials, API keys, and other sensitive configuration that should never be exposed to end users.',
|
|
192
200
|
severity: 'high',
|
|
201
|
+
levelId: 2,
|
|
193
202
|
category: 'information_disclosure',
|
|
194
203
|
scanner: 'sensitive-path-scout',
|
|
195
204
|
cvss: {
|
|
@@ -206,11 +215,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
206
215
|
remediation: 'Remove .env files from web-accessible directories. Block access to dotfiles in web server config. Rotate all credentials found in exposed files. Use secrets management services.',
|
|
207
216
|
},
|
|
208
217
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG]: {
|
|
209
|
-
id:
|
|
218
|
+
id: 509,
|
|
210
219
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORDPRESS_CONFIG,
|
|
211
220
|
title: 'WordPress Configuration File Exposed',
|
|
212
221
|
description: 'WordPress wp-config.php file is accessible and readable, exposing database credentials, authentication keys, salts, table prefix, and debug settings that allow complete compromise of the WordPress installation and underlying database.',
|
|
213
222
|
severity: 'high',
|
|
223
|
+
levelId: 2,
|
|
214
224
|
category: 'information_disclosure',
|
|
215
225
|
scanner: 'sensitive-path-scout',
|
|
216
226
|
cvss: {
|
|
@@ -227,11 +237,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
227
237
|
remediation: 'Ensure PHP is properly configured to execute .php files rather than serve them as text. Move wp-config.php above the web root. Change database credentials immediately.',
|
|
228
238
|
},
|
|
229
239
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR]: {
|
|
230
|
-
id:
|
|
240
|
+
id: 510,
|
|
231
241
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_ACTUATOR,
|
|
232
242
|
title: 'Spring Boot Actuator Endpoints Exposed',
|
|
233
243
|
description: 'Spring Boot Actuator management endpoints are publicly accessible without authentication, exposing application internals including environment variables, configuration properties, health status, thread dumps, and potentially enabling remote code execution through certain endpoints.',
|
|
234
244
|
severity: 'high',
|
|
245
|
+
levelId: 2,
|
|
235
246
|
category: 'information_disclosure',
|
|
236
247
|
scanner: 'sensitive-path-scout',
|
|
237
248
|
cvss: {
|
|
@@ -249,11 +260,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
249
260
|
remediation: 'Secure actuator endpoints with authentication. Disable sensitive endpoints in production. Use separate management port accessible only internally. Apply principle of least exposure.',
|
|
250
261
|
},
|
|
251
262
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP]: {
|
|
252
|
-
id:
|
|
263
|
+
id: 511,
|
|
253
264
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_HEAPDUMP,
|
|
254
265
|
title: 'Spring Boot Heapdump Exposed',
|
|
255
266
|
description: 'Spring Boot Actuator heapdump endpoint is accessible allowing download of JVM heap memory containing sensitive runtime data including session tokens, passwords, encryption keys, personal data, and other secrets temporarily held in application memory.',
|
|
256
267
|
severity: 'critical',
|
|
268
|
+
levelId: 1,
|
|
257
269
|
category: 'information_disclosure',
|
|
258
270
|
scanner: 'sensitive-path-scout',
|
|
259
271
|
cvss: {
|
|
@@ -270,11 +282,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
270
282
|
remediation: 'Disable heapdump endpoint in production (management.endpoint.heapdump.enabled=false). Require authentication for all actuator endpoints. Invalidate all active sessions.',
|
|
271
283
|
},
|
|
272
284
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO]: {
|
|
273
|
-
id:
|
|
285
|
+
id: 512,
|
|
274
286
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_PHPINFO,
|
|
275
287
|
title: 'PHP Info Page Exposed',
|
|
276
288
|
description: 'PHP info page (phpinfo.php) is publicly accessible revealing complete server configuration including PHP version, loaded modules, environment variables, system paths, and potentially database connection strings that aid attackers in planning targeted attacks.',
|
|
277
289
|
severity: 'medium',
|
|
290
|
+
levelId: 3,
|
|
278
291
|
category: 'information_disclosure',
|
|
279
292
|
scanner: 'sensitive-path-scout',
|
|
280
293
|
cvss: {
|
|
@@ -291,11 +304,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
291
304
|
remediation: 'Remove phpinfo files from production servers. If needed for debugging, protect with authentication or IP restrictions. Delete all debug and test files before deployment.',
|
|
292
305
|
},
|
|
293
306
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG]: {
|
|
294
|
-
id:
|
|
307
|
+
id: 513,
|
|
295
308
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_DEBUG,
|
|
296
309
|
title: 'Laravel Debug Mode Enabled',
|
|
297
310
|
description: 'Laravel application is running with debug mode enabled in production, exposing detailed stack traces, database queries, environment variables, and potentially the APP_KEY which can be used to decrypt session data and forge authenticated sessions.',
|
|
298
311
|
severity: 'high',
|
|
312
|
+
levelId: 2,
|
|
299
313
|
category: 'information_disclosure',
|
|
300
314
|
scanner: 'sensitive-path-scout',
|
|
301
315
|
cvss: {
|
|
@@ -312,11 +326,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
312
326
|
remediation: 'Set APP_DEBUG=false in production environment. Rotate APP_KEY if exposed. Implement proper error logging that does not expose internals to users.',
|
|
313
327
|
},
|
|
314
328
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION]: {
|
|
315
|
-
id:
|
|
329
|
+
id: 514,
|
|
316
330
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GRAPHQL_INTROSPECTION,
|
|
317
331
|
title: 'GraphQL Introspection Enabled',
|
|
318
332
|
description: 'GraphQL API has introspection enabled in production, allowing attackers to query the complete schema including all types, queries, mutations, and fields, which reveals the entire API structure and aids in discovering sensitive operations and data access points.',
|
|
319
333
|
severity: 'medium',
|
|
334
|
+
levelId: 3,
|
|
320
335
|
category: 'information_disclosure',
|
|
321
336
|
scanner: 'sensitive-path-scout',
|
|
322
337
|
cvss: {
|
|
@@ -333,11 +348,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
333
348
|
remediation: 'Disable introspection in production (introspection: false in Apollo Server). Implement query depth limiting and complexity analysis. Use persisted queries.',
|
|
334
349
|
},
|
|
335
350
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP]: {
|
|
336
|
-
id:
|
|
351
|
+
id: 515,
|
|
337
352
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DATABASE_BACKUP,
|
|
338
353
|
title: 'Database Backup File Exposed',
|
|
339
354
|
description: 'Database backup or dump file (.sql, .dump, .bak) is publicly accessible containing complete database contents including user credentials, personal information, business data, and all other stored information enabling massive data breach.',
|
|
340
355
|
severity: 'critical',
|
|
356
|
+
levelId: 1,
|
|
341
357
|
category: 'information_disclosure',
|
|
342
358
|
scanner: 'sensitive-path-scout',
|
|
343
359
|
cvss: {
|
|
@@ -357,11 +373,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
357
373
|
// MEDIUM - API & SERVICE EXPOSURE
|
|
358
374
|
// ========================================
|
|
359
375
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS]: {
|
|
360
|
-
id:
|
|
376
|
+
id: 516,
|
|
361
377
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SWAGGER_DOCS,
|
|
362
378
|
title: 'Swagger/OpenAPI Documentation Exposed',
|
|
363
379
|
description: 'API documentation (swagger.json, openapi.yaml) is publicly accessible revealing complete API structure including all endpoints, parameters, authentication methods, and data models which aids attackers in understanding and exploiting the API systematically.',
|
|
364
380
|
severity: 'low',
|
|
381
|
+
levelId: 4,
|
|
365
382
|
category: 'information_disclosure',
|
|
366
383
|
scanner: 'sensitive-path-scout',
|
|
367
384
|
cvss: {
|
|
@@ -378,11 +395,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
378
395
|
remediation: 'Protect API documentation with authentication if it should be internal. Ensure publicly documented APIs have proper authorization. Remove internal endpoints from public docs.',
|
|
379
396
|
},
|
|
380
397
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS]: {
|
|
381
|
-
id:
|
|
398
|
+
id: 517,
|
|
382
399
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PROMETHEUS_METRICS,
|
|
383
400
|
title: 'Prometheus Metrics Endpoint Exposed',
|
|
384
401
|
description: 'Prometheus metrics endpoint (/metrics) is publicly accessible exposing application performance data, error rates, request patterns, resource usage, and potentially business metrics that reveal internal operations and aid in planning attacks.',
|
|
385
402
|
severity: 'medium',
|
|
403
|
+
levelId: 3,
|
|
386
404
|
category: 'information_disclosure',
|
|
387
405
|
scanner: 'sensitive-path-scout',
|
|
388
406
|
cvss: {
|
|
@@ -399,11 +417,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
399
417
|
remediation: 'Restrict metrics endpoint to internal network or Prometheus server IPs. Use separate port for metrics collection. Implement authentication if external access is required.',
|
|
400
418
|
},
|
|
401
419
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL]: {
|
|
402
|
-
id:
|
|
420
|
+
id: 518,
|
|
403
421
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ADMIN_PANEL,
|
|
404
422
|
title: 'Admin Panel Publicly Accessible',
|
|
405
423
|
description: 'Administrative interface is accessible from the public internet without IP restrictions, enabling brute force attacks against admin credentials and exposing sensitive management functionality that should be restricted to internal networks only.',
|
|
406
424
|
severity: 'medium',
|
|
425
|
+
levelId: 3,
|
|
407
426
|
category: 'access_control',
|
|
408
427
|
scanner: 'sensitive-path-scout',
|
|
409
428
|
cvss: {
|
|
@@ -420,11 +439,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
420
439
|
remediation: 'Restrict admin panel access to VPN or internal IP ranges. Implement strong multi-factor authentication. Use rate limiting and account lockout. Consider separate admin domain.',
|
|
421
440
|
},
|
|
422
441
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP]: {
|
|
423
|
-
id:
|
|
442
|
+
id: 519,
|
|
424
443
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SOURCE_MAP,
|
|
425
444
|
title: 'JavaScript Source Maps Exposed',
|
|
426
445
|
description: 'JavaScript source map files (.js.map) are publicly accessible allowing attackers to view original unminified source code including comments, variable names, internal logic, and potentially security-sensitive implementation details.',
|
|
427
446
|
severity: 'low',
|
|
447
|
+
levelId: 4,
|
|
428
448
|
category: 'information_disclosure',
|
|
429
449
|
scanner: 'sensitive-path-scout',
|
|
430
450
|
cvss: {
|
|
@@ -444,11 +464,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
444
464
|
// EXTENDED SENSITIVE PATH EXPOSURES
|
|
445
465
|
// ========================================
|
|
446
466
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON]: {
|
|
447
|
-
id:
|
|
467
|
+
id: 520,
|
|
448
468
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_UN_PROTECTED_CONFIG_JSON,
|
|
449
469
|
title: 'Un Protected Config JSON',
|
|
450
470
|
description: 'The application exposes un protected config json in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
451
471
|
severity: 'medium',
|
|
472
|
+
levelId: 3,
|
|
452
473
|
category: 'information_disclosure',
|
|
453
474
|
scanner: 'sensitive-path-scout',
|
|
454
475
|
cvss: {
|
|
@@ -465,11 +486,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
465
486
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
466
487
|
},
|
|
467
488
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED]: {
|
|
468
|
-
id:
|
|
489
|
+
id: 521,
|
|
469
490
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WEB_SERVER_CONFIGURATION_FILE_DETECTED,
|
|
470
491
|
title: 'Web Server Configuration File Detected',
|
|
471
492
|
description: 'The application exposes web server configuration file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
472
493
|
severity: 'high',
|
|
494
|
+
levelId: 2,
|
|
473
495
|
category: 'information_disclosure',
|
|
474
496
|
scanner: 'sensitive-path-scout',
|
|
475
497
|
cvss: {
|
|
@@ -486,11 +508,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
486
508
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
487
509
|
},
|
|
488
510
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED]: {
|
|
489
|
-
id:
|
|
511
|
+
id: 522,
|
|
490
512
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_APPSETTINGS_JSON_EXPOSED,
|
|
491
513
|
title: 'Appsettings JSON Exposed',
|
|
492
514
|
description: 'The application exposes appsettings json exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
493
515
|
severity: 'high',
|
|
516
|
+
levelId: 2,
|
|
494
517
|
category: 'information_disclosure',
|
|
495
518
|
scanner: 'sensitive-path-scout',
|
|
496
519
|
cvss: {
|
|
@@ -507,11 +530,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
507
530
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
508
531
|
},
|
|
509
532
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED]: {
|
|
510
|
-
id:
|
|
533
|
+
id: 523,
|
|
511
534
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_CONFIG_EXPOSED,
|
|
512
535
|
title: 'Spring Config Exposed',
|
|
513
536
|
description: 'The application exposes spring config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
514
537
|
severity: 'high',
|
|
538
|
+
levelId: 2,
|
|
515
539
|
category: 'information_disclosure',
|
|
516
540
|
scanner: 'sensitive-path-scout',
|
|
517
541
|
cvss: {
|
|
@@ -528,11 +552,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
528
552
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
529
553
|
},
|
|
530
554
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED]: {
|
|
531
|
-
id:
|
|
555
|
+
id: 524,
|
|
532
556
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_NPMRC_EXPOSED,
|
|
533
557
|
title: 'Npmrc Exposed',
|
|
534
558
|
description: 'The application exposes npmrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
535
559
|
severity: 'high',
|
|
560
|
+
levelId: 2,
|
|
536
561
|
category: 'information_disclosure',
|
|
537
562
|
scanner: 'sensitive-path-scout',
|
|
538
563
|
cvss: {
|
|
@@ -549,11 +574,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
549
574
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
550
575
|
},
|
|
551
576
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED]: {
|
|
552
|
-
id:
|
|
577
|
+
id: 525,
|
|
553
578
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TOML_PROJECT_FILE_EXPOSED,
|
|
554
579
|
title: 'TOML Project File Exposed',
|
|
555
580
|
description: 'The application exposes toml project file exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
556
581
|
severity: 'low',
|
|
582
|
+
levelId: 4,
|
|
557
583
|
category: 'information_disclosure',
|
|
558
584
|
scanner: 'sensitive-path-scout',
|
|
559
585
|
cvss: {
|
|
@@ -570,11 +596,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
570
596
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
571
597
|
},
|
|
572
598
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED]: {
|
|
573
|
-
id:
|
|
599
|
+
id: 526,
|
|
574
600
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_RAILS_DATABASE_YML_EXPOSED,
|
|
575
601
|
title: 'Rails Database YML Exposed',
|
|
576
602
|
description: 'The application exposes rails database yml exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
577
603
|
severity: 'high',
|
|
604
|
+
levelId: 2,
|
|
578
605
|
category: 'information_disclosure',
|
|
579
606
|
scanner: 'sensitive-path-scout',
|
|
580
607
|
cvss: {
|
|
@@ -591,11 +618,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
591
618
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
592
619
|
},
|
|
593
620
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED]: {
|
|
594
|
-
id:
|
|
621
|
+
id: 527,
|
|
595
622
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DRUPAL_SETTINGS_PHP_EXPOSED,
|
|
596
623
|
title: 'Drupal Settings PHP Exposed',
|
|
597
624
|
description: 'The application exposes drupal settings php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
598
625
|
severity: 'high',
|
|
626
|
+
levelId: 2,
|
|
599
627
|
category: 'information_disclosure',
|
|
600
628
|
scanner: 'sensitive-path-scout',
|
|
601
629
|
cvss: {
|
|
@@ -612,11 +640,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
612
640
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
613
641
|
},
|
|
614
642
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED]: {
|
|
615
|
-
id:
|
|
643
|
+
id: 528,
|
|
616
644
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MAGENTO_ENV_PHP_EXPOSED,
|
|
617
645
|
title: 'Magento Env PHP Exposed',
|
|
618
646
|
description: 'The application exposes magento env php exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
619
647
|
severity: 'high',
|
|
648
|
+
levelId: 2,
|
|
620
649
|
category: 'information_disclosure',
|
|
621
650
|
scanner: 'sensitive-path-scout',
|
|
622
651
|
cvss: {
|
|
@@ -633,11 +662,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
633
662
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
634
663
|
},
|
|
635
664
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED]: {
|
|
636
|
-
id:
|
|
665
|
+
id: 529,
|
|
637
666
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_JOLOKIA_EXPOSED,
|
|
638
667
|
title: 'Jolokia Exposed',
|
|
639
668
|
description: 'The application exposes jolokia exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
640
669
|
severity: 'high',
|
|
670
|
+
levelId: 2,
|
|
641
671
|
category: 'information_disclosure',
|
|
642
672
|
scanner: 'sensitive-path-scout',
|
|
643
673
|
cvss: {
|
|
@@ -654,11 +684,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
654
684
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
655
685
|
},
|
|
656
686
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED]: {
|
|
657
|
-
id:
|
|
687
|
+
id: 530,
|
|
658
688
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SVN_WORKING_COPY_DATABASE_EXPOSED,
|
|
659
689
|
title: 'SVN Working Copy Database Exposed',
|
|
660
690
|
description: 'The application exposes svn working copy database exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
661
691
|
severity: 'high',
|
|
692
|
+
levelId: 2,
|
|
662
693
|
category: 'information_disclosure',
|
|
663
694
|
scanner: 'sensitive-path-scout',
|
|
664
695
|
cvss: {
|
|
@@ -675,11 +706,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
675
706
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
676
707
|
},
|
|
677
708
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED]: {
|
|
678
|
-
id:
|
|
709
|
+
id: 531,
|
|
679
710
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SUBVERSION_REPOSITORY_DETECTED,
|
|
680
711
|
title: 'Subversion Repository Detected',
|
|
681
712
|
description: 'The application exposes subversion repository detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
682
713
|
severity: 'high',
|
|
714
|
+
levelId: 2,
|
|
683
715
|
category: 'information_disclosure',
|
|
684
716
|
scanner: 'sensitive-path-scout',
|
|
685
717
|
cvss: {
|
|
@@ -696,11 +728,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
696
728
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
697
729
|
},
|
|
698
730
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND]: {
|
|
699
|
-
id:
|
|
731
|
+
id: 532,
|
|
700
732
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_REPOSITORY_FOUND,
|
|
701
733
|
title: 'Mercurial Repository Found',
|
|
702
734
|
description: 'The application exposes mercurial repository found in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
703
735
|
severity: 'medium',
|
|
736
|
+
levelId: 3,
|
|
704
737
|
category: 'information_disclosure',
|
|
705
738
|
scanner: 'sensitive-path-scout',
|
|
706
739
|
cvss: {
|
|
@@ -717,11 +750,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
717
750
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
718
751
|
},
|
|
719
752
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED]: {
|
|
720
|
-
id:
|
|
753
|
+
id: 533,
|
|
721
754
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_MERCURIAL_HGRC_EXPOSED,
|
|
722
755
|
title: 'Mercurial Hgrc Exposed',
|
|
723
756
|
description: 'The application exposes mercurial hgrc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
724
757
|
severity: 'medium',
|
|
758
|
+
levelId: 3,
|
|
725
759
|
category: 'information_disclosure',
|
|
726
760
|
scanner: 'sensitive-path-scout',
|
|
727
761
|
cvss: {
|
|
@@ -738,11 +772,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
738
772
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
739
773
|
},
|
|
740
774
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED]: {
|
|
741
|
-
id:
|
|
775
|
+
id: 534,
|
|
742
776
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ROOT_EXPOSED,
|
|
743
777
|
title: 'CVS Root Exposed',
|
|
744
778
|
description: 'The application exposes cvs root exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
745
779
|
severity: 'medium',
|
|
780
|
+
levelId: 3,
|
|
746
781
|
category: 'information_disclosure',
|
|
747
782
|
scanner: 'sensitive-path-scout',
|
|
748
783
|
cvss: {
|
|
@@ -759,11 +794,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
759
794
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
760
795
|
},
|
|
761
796
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED]: {
|
|
762
|
-
id:
|
|
797
|
+
id: 535,
|
|
763
798
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_CVS_ENTRIES_EXPOSED,
|
|
764
799
|
title: 'CVS Entries Exposed',
|
|
765
800
|
description: 'The application exposes cvs entries exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
766
801
|
severity: 'medium',
|
|
802
|
+
levelId: 3,
|
|
767
803
|
category: 'information_disclosure',
|
|
768
804
|
scanner: 'sensitive-path-scout',
|
|
769
805
|
cvss: {
|
|
@@ -780,11 +816,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
780
816
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
781
817
|
},
|
|
782
818
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED]: {
|
|
783
|
-
id:
|
|
819
|
+
id: 536,
|
|
784
820
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_BAZAAR_REPO_EXPOSED,
|
|
785
821
|
title: 'Bazaar Repo Exposed',
|
|
786
822
|
description: 'The application exposes bazaar repo exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
787
823
|
severity: 'medium',
|
|
824
|
+
levelId: 3,
|
|
788
825
|
category: 'information_disclosure',
|
|
789
826
|
scanner: 'sensitive-path-scout',
|
|
790
827
|
cvss: {
|
|
@@ -801,11 +838,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
801
838
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
802
839
|
},
|
|
803
840
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED]: {
|
|
804
|
-
id:
|
|
841
|
+
id: 537,
|
|
805
842
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SPRING_BOOT_THREAD_DUMP_EXPOSED,
|
|
806
843
|
title: 'Spring Boot Thread Dump Exposed',
|
|
807
844
|
description: 'The application exposes spring boot thread dump exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
808
845
|
severity: 'high',
|
|
846
|
+
levelId: 2,
|
|
809
847
|
category: 'information_disclosure',
|
|
810
848
|
scanner: 'sensitive-path-scout',
|
|
811
849
|
cvss: {
|
|
@@ -822,11 +860,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
822
860
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
823
861
|
},
|
|
824
862
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED]: {
|
|
825
|
-
id:
|
|
863
|
+
id: 538,
|
|
826
864
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_REDIS_RDB_DUMP_DETECTED,
|
|
827
865
|
title: 'Redis Rdb Dump Detected',
|
|
828
866
|
description: 'The application exposes redis rdb dump detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
829
867
|
severity: 'high',
|
|
868
|
+
levelId: 2,
|
|
830
869
|
category: 'information_disclosure',
|
|
831
870
|
scanner: 'sensitive-path-scout',
|
|
832
871
|
cvss: {
|
|
@@ -843,11 +882,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
843
882
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
844
883
|
},
|
|
845
884
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
846
|
-
id:
|
|
885
|
+
id: 539,
|
|
847
886
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_ATLASSIAN_BITBUCKET_PIPELINES_CONFIGURATION_DETECTED,
|
|
848
887
|
title: 'Atlassian Bitbucket Pipelines Configuration Detected',
|
|
849
888
|
description: 'The application exposes atlassian bitbucket pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
850
889
|
severity: 'low',
|
|
890
|
+
levelId: 4,
|
|
851
891
|
category: 'information_disclosure',
|
|
852
892
|
scanner: 'sensitive-path-scout',
|
|
853
893
|
cvss: {
|
|
@@ -864,11 +904,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
864
904
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
865
905
|
},
|
|
866
906
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED]: {
|
|
867
|
-
id:
|
|
907
|
+
id: 540,
|
|
868
908
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AZURE_PIPELINES_CONFIGURATION_DETECTED,
|
|
869
909
|
title: 'AZURE Pipelines Configuration Detected',
|
|
870
910
|
description: 'The application exposes azure pipelines configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
871
911
|
severity: 'low',
|
|
912
|
+
levelId: 4,
|
|
872
913
|
category: 'information_disclosure',
|
|
873
914
|
scanner: 'sensitive-path-scout',
|
|
874
915
|
cvss: {
|
|
@@ -885,11 +926,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
885
926
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
886
927
|
},
|
|
887
928
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED]: {
|
|
888
|
-
id:
|
|
929
|
+
id: 541,
|
|
889
930
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWS_CODE_BUILD_BUILDSPEC_DETECTED,
|
|
890
931
|
title: 'AWS Code Build Buildspec Detected',
|
|
891
932
|
description: 'The application exposes aws code build buildspec detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
892
933
|
severity: 'low',
|
|
934
|
+
levelId: 4,
|
|
893
935
|
category: 'information_disclosure',
|
|
894
936
|
scanner: 'sensitive-path-scout',
|
|
895
937
|
cvss: {
|
|
@@ -906,11 +948,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
906
948
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
907
949
|
},
|
|
908
950
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED]: {
|
|
909
|
-
id:
|
|
951
|
+
id: 542,
|
|
910
952
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_GITHUB_ACTIONS_WORKFLOW_DETECTED,
|
|
911
953
|
title: 'Github Actions Workflow Detected',
|
|
912
954
|
description: 'The application exposes github actions workflow detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
913
955
|
severity: 'low',
|
|
956
|
+
levelId: 4,
|
|
914
957
|
category: 'information_disclosure',
|
|
915
958
|
scanner: 'sensitive-path-scout',
|
|
916
959
|
cvss: {
|
|
@@ -927,11 +970,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
927
970
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
928
971
|
},
|
|
929
972
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED]: {
|
|
930
|
-
id:
|
|
973
|
+
id: 543,
|
|
931
974
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_DOCKER_COMPOSE_CONFIGURATION_DETECTED,
|
|
932
975
|
title: 'Docker Compose Configuration Detected',
|
|
933
976
|
description: 'The application exposes docker compose configuration detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
934
977
|
severity: 'medium',
|
|
978
|
+
levelId: 3,
|
|
935
979
|
category: 'information_disclosure',
|
|
936
980
|
scanner: 'sensitive-path-scout',
|
|
937
981
|
cvss: {
|
|
@@ -948,11 +992,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
948
992
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
949
993
|
},
|
|
950
994
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD]: {
|
|
951
|
-
id:
|
|
995
|
+
id: 544,
|
|
952
996
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TRACE_AXD,
|
|
953
997
|
title: 'Trace Axd',
|
|
954
998
|
description: 'The application exposes trace axd in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
955
999
|
severity: 'high',
|
|
1000
|
+
levelId: 2,
|
|
956
1001
|
category: 'information_disclosure',
|
|
957
1002
|
scanner: 'sensitive-path-scout',
|
|
958
1003
|
cvss: {
|
|
@@ -969,11 +1014,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
969
1014
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
970
1015
|
},
|
|
971
1016
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED]: {
|
|
972
|
-
id:
|
|
1017
|
+
id: 545,
|
|
973
1018
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ELMAH_AXD_EXPOSED,
|
|
974
1019
|
title: 'Elmah Axd Exposed',
|
|
975
1020
|
description: 'The application exposes elmah axd exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
976
1021
|
severity: 'high',
|
|
1022
|
+
levelId: 2,
|
|
977
1023
|
category: 'information_disclosure',
|
|
978
1024
|
scanner: 'sensitive-path-scout',
|
|
979
1025
|
cvss: {
|
|
@@ -990,11 +1036,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
990
1036
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
991
1037
|
},
|
|
992
1038
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED]: {
|
|
993
|
-
id:
|
|
1039
|
+
id: 546,
|
|
994
1040
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_LARAVEL_LOG_VIEWER_ENABLED,
|
|
995
1041
|
title: 'Laravel Log Viewer Enabled',
|
|
996
1042
|
description: 'The application exposes laravel log viewer enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
997
1043
|
severity: 'medium',
|
|
1044
|
+
levelId: 3,
|
|
998
1045
|
category: 'information_disclosure',
|
|
999
1046
|
scanner: 'sensitive-path-scout',
|
|
1000
1047
|
cvss: {
|
|
@@ -1011,11 +1058,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1011
1058
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1012
1059
|
},
|
|
1013
1060
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED]: {
|
|
1014
|
-
id:
|
|
1061
|
+
id: 547,
|
|
1015
1062
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_HTACCESS_FILE_DETECTED,
|
|
1016
1063
|
title: 'Apache Htaccess File Detected',
|
|
1017
1064
|
description: 'The application exposes apache htaccess file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1018
1065
|
severity: 'medium',
|
|
1066
|
+
levelId: 3,
|
|
1019
1067
|
category: 'information_disclosure',
|
|
1020
1068
|
scanner: 'sensitive-path-scout',
|
|
1021
1069
|
cvss: {
|
|
@@ -1032,11 +1080,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1032
1080
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1033
1081
|
},
|
|
1034
1082
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED]: {
|
|
1035
|
-
id:
|
|
1083
|
+
id: 548,
|
|
1036
1084
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APACHE_SERVER_INFO_EXPOSED,
|
|
1037
1085
|
title: 'Apache Server Info Exposed',
|
|
1038
1086
|
description: 'The application exposes apache server info exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1039
1087
|
severity: 'medium',
|
|
1088
|
+
levelId: 3,
|
|
1040
1089
|
category: 'information_disclosure',
|
|
1041
1090
|
scanner: 'sensitive-path-scout',
|
|
1042
1091
|
cvss: {
|
|
@@ -1053,11 +1102,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1053
1102
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1054
1103
|
},
|
|
1055
1104
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED]: {
|
|
1056
|
-
id:
|
|
1105
|
+
id: 549,
|
|
1057
1106
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_SQLITE_DATABASE_DETECTED,
|
|
1058
1107
|
title: 'Sqlite Database Detected',
|
|
1059
1108
|
description: 'The application exposes sqlite database detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1060
1109
|
severity: 'high',
|
|
1110
|
+
levelId: 2,
|
|
1061
1111
|
category: 'information_disclosure',
|
|
1062
1112
|
scanner: 'sensitive-path-scout',
|
|
1063
1113
|
cvss: {
|
|
@@ -1074,11 +1124,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1074
1124
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1075
1125
|
},
|
|
1076
1126
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED]: {
|
|
1077
|
-
id:
|
|
1127
|
+
id: 550,
|
|
1078
1128
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PACKAGE_DEPENDENCIES_DETECTED,
|
|
1079
1129
|
title: 'Package Dependencies Detected',
|
|
1080
1130
|
description: 'The application exposes package dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1081
1131
|
severity: 'medium',
|
|
1132
|
+
levelId: 3,
|
|
1082
1133
|
category: 'information_disclosure',
|
|
1083
1134
|
scanner: 'sensitive-path-scout',
|
|
1084
1135
|
cvss: {
|
|
@@ -1095,11 +1146,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1095
1146
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1096
1147
|
},
|
|
1097
1148
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED]: {
|
|
1098
|
-
id:
|
|
1149
|
+
id: 551,
|
|
1099
1150
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_PHP_COMPOSER_DEPENDENCIES_DETECTED,
|
|
1100
1151
|
title: 'PHP Composer Dependencies Detected',
|
|
1101
1152
|
description: 'The application exposes php composer dependencies detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1102
1153
|
severity: 'medium',
|
|
1154
|
+
levelId: 3,
|
|
1103
1155
|
category: 'information_disclosure',
|
|
1104
1156
|
scanner: 'sensitive-path-scout',
|
|
1105
1157
|
cvss: {
|
|
@@ -1116,11 +1168,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1116
1168
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1117
1169
|
},
|
|
1118
1170
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED]: {
|
|
1119
|
-
id:
|
|
1171
|
+
id: 552,
|
|
1120
1172
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_PYTHON_REQUIREMENTS_DETECTED,
|
|
1121
1173
|
title: 'Python Requirements Detected',
|
|
1122
1174
|
description: 'The application exposes python requirements detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1123
1175
|
severity: 'low',
|
|
1176
|
+
levelId: 4,
|
|
1124
1177
|
category: 'information_disclosure',
|
|
1125
1178
|
scanner: 'sensitive-path-scout',
|
|
1126
1179
|
cvss: {
|
|
@@ -1137,11 +1190,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1137
1190
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1138
1191
|
},
|
|
1139
1192
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED]: {
|
|
1140
|
-
id:
|
|
1193
|
+
id: 553,
|
|
1141
1194
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AWS_CONFIG_EXPOSED,
|
|
1142
1195
|
title: 'AWS Config Exposed',
|
|
1143
1196
|
description: 'The application exposes aws config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1144
1197
|
severity: 'high',
|
|
1198
|
+
levelId: 2,
|
|
1145
1199
|
category: 'information_disclosure',
|
|
1146
1200
|
scanner: 'sensitive-path-scout',
|
|
1147
1201
|
cvss: {
|
|
@@ -1158,11 +1212,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1158
1212
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1159
1213
|
},
|
|
1160
1214
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED]: {
|
|
1161
|
-
id:
|
|
1215
|
+
id: 554,
|
|
1162
1216
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_CREDENTIALS_EXPOSED,
|
|
1163
1217
|
title: 'AZURE Credentials Exposed',
|
|
1164
1218
|
description: 'The application exposes azure credentials exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1165
1219
|
severity: 'high',
|
|
1220
|
+
levelId: 2,
|
|
1166
1221
|
category: 'information_disclosure',
|
|
1167
1222
|
scanner: 'sensitive-path-scout',
|
|
1168
1223
|
cvss: {
|
|
@@ -1179,11 +1234,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1179
1234
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1180
1235
|
},
|
|
1181
1236
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED]: {
|
|
1182
|
-
id:
|
|
1237
|
+
id: 555,
|
|
1183
1238
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_HELM_VALUES_EXPOSED,
|
|
1184
1239
|
title: 'Helm Values Exposed',
|
|
1185
1240
|
description: 'The application exposes helm values exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1186
1241
|
severity: 'high',
|
|
1242
|
+
levelId: 2,
|
|
1187
1243
|
category: 'information_disclosure',
|
|
1188
1244
|
scanner: 'sensitive-path-scout',
|
|
1189
1245
|
cvss: {
|
|
@@ -1200,11 +1256,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1200
1256
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1201
1257
|
},
|
|
1202
1258
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED]: {
|
|
1203
|
-
id:
|
|
1259
|
+
id: 556,
|
|
1204
1260
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSH_PUBLIC_KEY_EXPOSED,
|
|
1205
1261
|
title: 'SSH Public Key Exposed',
|
|
1206
1262
|
description: 'The application exposes ssh public key exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1207
1263
|
severity: 'medium',
|
|
1264
|
+
levelId: 3,
|
|
1208
1265
|
category: 'information_disclosure',
|
|
1209
1266
|
scanner: 'sensitive-path-scout',
|
|
1210
1267
|
cvss: {
|
|
@@ -1221,11 +1278,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1221
1278
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1222
1279
|
},
|
|
1223
1280
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED]: {
|
|
1224
|
-
id:
|
|
1281
|
+
id: 557,
|
|
1225
1282
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_SSL_CERTIFICATE_EXPOSED,
|
|
1226
1283
|
title: 'SSL Certificate Exposed',
|
|
1227
1284
|
description: 'The application exposes ssl certificate exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1228
1285
|
severity: 'medium',
|
|
1286
|
+
levelId: 3,
|
|
1229
1287
|
category: 'information_disclosure',
|
|
1230
1288
|
scanner: 'sensitive-path-scout',
|
|
1231
1289
|
cvss: {
|
|
@@ -1242,11 +1300,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1242
1300
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1243
1301
|
},
|
|
1244
1302
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED]: {
|
|
1245
|
-
id:
|
|
1303
|
+
id: 558,
|
|
1246
1304
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPH_QL_ENDPOINT_EXPOSED,
|
|
1247
1305
|
title: 'Graph Ql Endpoint Exposed',
|
|
1248
1306
|
description: 'The application exposes graph ql endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1249
1307
|
severity: 'medium',
|
|
1308
|
+
levelId: 3,
|
|
1250
1309
|
category: 'information_disclosure',
|
|
1251
1310
|
scanner: 'sensitive-path-scout',
|
|
1252
1311
|
cvss: {
|
|
@@ -1263,11 +1322,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1263
1322
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1264
1323
|
},
|
|
1265
1324
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED]: {
|
|
1266
|
-
id:
|
|
1325
|
+
id: 559,
|
|
1267
1326
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_GRAPHI_QL_EXPOSED,
|
|
1268
1327
|
title: 'Graphi Ql Exposed',
|
|
1269
1328
|
description: 'The application exposes graphi ql exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1270
1329
|
severity: 'medium',
|
|
1330
|
+
levelId: 3,
|
|
1271
1331
|
category: 'information_disclosure',
|
|
1272
1332
|
scanner: 'sensitive-path-scout',
|
|
1273
1333
|
cvss: {
|
|
@@ -1284,11 +1344,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1284
1344
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1285
1345
|
},
|
|
1286
1346
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED]: {
|
|
1287
|
-
id:
|
|
1347
|
+
id: 560,
|
|
1288
1348
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_TERRAFORM_LOCK_EXPOSED,
|
|
1289
1349
|
title: 'Terraform Lock Exposed',
|
|
1290
1350
|
description: 'The application exposes terraform lock exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1291
1351
|
severity: 'medium',
|
|
1352
|
+
levelId: 3,
|
|
1292
1353
|
category: 'information_disclosure',
|
|
1293
1354
|
scanner: 'sensitive-path-scout',
|
|
1294
1355
|
cvss: {
|
|
@@ -1305,11 +1366,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1305
1366
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1306
1367
|
},
|
|
1307
1368
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED]: {
|
|
1308
|
-
id:
|
|
1369
|
+
id: 561,
|
|
1309
1370
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_TERRAFORM_VARS_EXPOSED,
|
|
1310
1371
|
title: 'Terraform Vars Exposed',
|
|
1311
1372
|
description: 'The application exposes terraform vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1312
1373
|
severity: 'high',
|
|
1374
|
+
levelId: 2,
|
|
1313
1375
|
category: 'information_disclosure',
|
|
1314
1376
|
scanner: 'sensitive-path-scout',
|
|
1315
1377
|
cvss: {
|
|
@@ -1326,11 +1388,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1326
1388
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1327
1389
|
},
|
|
1328
1390
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED]: {
|
|
1329
|
-
id:
|
|
1391
|
+
id: 562,
|
|
1330
1392
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ERROR_LOG_EXPOSED,
|
|
1331
1393
|
title: 'Error Log Exposed',
|
|
1332
1394
|
description: 'The application exposes error log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1333
1395
|
severity: 'medium',
|
|
1396
|
+
levelId: 3,
|
|
1334
1397
|
category: 'information_disclosure',
|
|
1335
1398
|
scanner: 'sensitive-path-scout',
|
|
1336
1399
|
cvss: {
|
|
@@ -1347,11 +1410,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1347
1410
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1348
1411
|
},
|
|
1349
1412
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED]: {
|
|
1350
|
-
id:
|
|
1413
|
+
id: 563,
|
|
1351
1414
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_ACCESS_LOG_EXPOSED,
|
|
1352
1415
|
title: 'Access Log Exposed',
|
|
1353
1416
|
description: 'The application exposes access log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1354
1417
|
severity: 'medium',
|
|
1418
|
+
levelId: 3,
|
|
1355
1419
|
category: 'information_disclosure',
|
|
1356
1420
|
scanner: 'sensitive-path-scout',
|
|
1357
1421
|
cvss: {
|
|
@@ -1368,11 +1432,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1368
1432
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1369
1433
|
},
|
|
1370
1434
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED]: {
|
|
1371
|
-
id:
|
|
1435
|
+
id: 564,
|
|
1372
1436
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_DEBUG_LOG_EXPOSED,
|
|
1373
1437
|
title: 'Debug Log Exposed',
|
|
1374
1438
|
description: 'The application exposes debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1375
1439
|
severity: 'medium',
|
|
1440
|
+
levelId: 3,
|
|
1376
1441
|
category: 'information_disclosure',
|
|
1377
1442
|
scanner: 'sensitive-path-scout',
|
|
1378
1443
|
cvss: {
|
|
@@ -1389,11 +1454,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1389
1454
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1390
1455
|
},
|
|
1391
1456
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED]: {
|
|
1392
|
-
id:
|
|
1457
|
+
id: 565,
|
|
1393
1458
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_APPLICATION_LOG_EXPOSED,
|
|
1394
1459
|
title: 'Application Log Exposed',
|
|
1395
1460
|
description: 'The application exposes application log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1396
1461
|
severity: 'medium',
|
|
1462
|
+
levelId: 3,
|
|
1397
1463
|
category: 'information_disclosure',
|
|
1398
1464
|
scanner: 'sensitive-path-scout',
|
|
1399
1465
|
cvss: {
|
|
@@ -1410,11 +1476,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1410
1476
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1411
1477
|
},
|
|
1412
1478
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED]: {
|
|
1413
|
-
id:
|
|
1479
|
+
id: 566,
|
|
1414
1480
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_LARAVEL_LOG_EXPOSED,
|
|
1415
1481
|
title: 'Laravel Log Exposed',
|
|
1416
1482
|
description: 'The application exposes laravel log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1417
1483
|
severity: 'high',
|
|
1484
|
+
levelId: 2,
|
|
1418
1485
|
category: 'information_disclosure',
|
|
1419
1486
|
scanner: 'sensitive-path-scout',
|
|
1420
1487
|
cvss: {
|
|
@@ -1431,11 +1498,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1431
1498
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1432
1499
|
},
|
|
1433
1500
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED]: {
|
|
1434
|
-
id:
|
|
1501
|
+
id: 567,
|
|
1435
1502
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_WORD_PRESS_DEBUG_LOG_EXPOSED,
|
|
1436
1503
|
title: 'Word Press Debug Log Exposed',
|
|
1437
1504
|
description: 'The application exposes word press debug log exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1438
1505
|
severity: 'high',
|
|
1506
|
+
levelId: 2,
|
|
1439
1507
|
category: 'information_disclosure',
|
|
1440
1508
|
scanner: 'sensitive-path-scout',
|
|
1441
1509
|
cvss: {
|
|
@@ -1452,11 +1520,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1452
1520
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1453
1521
|
},
|
|
1454
1522
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED]: {
|
|
1455
|
-
id:
|
|
1523
|
+
id: 568,
|
|
1456
1524
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_ADMINER_EXPOSED,
|
|
1457
1525
|
title: 'Adminer Exposed',
|
|
1458
1526
|
description: 'The application exposes adminer exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1459
1527
|
severity: 'high',
|
|
1528
|
+
levelId: 2,
|
|
1460
1529
|
category: 'information_disclosure',
|
|
1461
1530
|
scanner: 'sensitive-path-scout',
|
|
1462
1531
|
cvss: {
|
|
@@ -1473,11 +1542,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1473
1542
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1474
1543
|
},
|
|
1475
1544
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED]: {
|
|
1476
|
-
id:
|
|
1545
|
+
id: 569,
|
|
1477
1546
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_WSDL_EXPOSED,
|
|
1478
1547
|
title: 'WSDL Exposed',
|
|
1479
1548
|
description: 'The application exposes wsdl exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1480
1549
|
severity: 'medium',
|
|
1550
|
+
levelId: 3,
|
|
1481
1551
|
category: 'information_disclosure',
|
|
1482
1552
|
scanner: 'sensitive-path-scout',
|
|
1483
1553
|
cvss: {
|
|
@@ -1494,11 +1564,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1494
1564
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1495
1565
|
},
|
|
1496
1566
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED]: {
|
|
1497
|
-
id:
|
|
1567
|
+
id: 570,
|
|
1498
1568
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_DEBUG_ENDPOINT_EXPOSED,
|
|
1499
1569
|
title: 'Debug Endpoint Exposed',
|
|
1500
1570
|
description: 'The application exposes debug endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1501
1571
|
severity: 'high',
|
|
1572
|
+
levelId: 2,
|
|
1502
1573
|
category: 'information_disclosure',
|
|
1503
1574
|
scanner: 'sensitive-path-scout',
|
|
1504
1575
|
cvss: {
|
|
@@ -1515,11 +1586,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1515
1586
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1516
1587
|
},
|
|
1517
1588
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED]: {
|
|
1518
|
-
id:
|
|
1589
|
+
id: 571,
|
|
1519
1590
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_DEBUG_VARS_EXPOSED,
|
|
1520
1591
|
title: 'Go Debug Vars Exposed',
|
|
1521
1592
|
description: 'The application exposes go debug vars exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1522
1593
|
severity: 'high',
|
|
1594
|
+
levelId: 2,
|
|
1523
1595
|
category: 'information_disclosure',
|
|
1524
1596
|
scanner: 'sensitive-path-scout',
|
|
1525
1597
|
cvss: {
|
|
@@ -1536,11 +1608,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1536
1608
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1537
1609
|
},
|
|
1538
1610
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED]: {
|
|
1539
|
-
id:
|
|
1611
|
+
id: 572,
|
|
1540
1612
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_GO_PPROF_EXPOSED,
|
|
1541
1613
|
title: 'Go Pprof Exposed',
|
|
1542
1614
|
description: 'The application exposes go pprof exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1543
1615
|
severity: 'high',
|
|
1616
|
+
levelId: 2,
|
|
1544
1617
|
category: 'information_disclosure',
|
|
1545
1618
|
scanner: 'sensitive-path-scout',
|
|
1546
1619
|
cvss: {
|
|
@@ -1557,11 +1630,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1557
1630
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1558
1631
|
},
|
|
1559
1632
|
[error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED]: {
|
|
1560
|
-
id:
|
|
1633
|
+
id: 573,
|
|
1561
1634
|
code: error_codes_js_1.VulnerabilityCode.SENS_MED_WORD_PRESS_XML_RPC_EXPOSED,
|
|
1562
1635
|
title: 'Word Press XML Rpc Exposed',
|
|
1563
1636
|
description: 'The application exposes word press xml rpc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1564
1637
|
severity: 'medium',
|
|
1638
|
+
levelId: 3,
|
|
1565
1639
|
category: 'information_disclosure',
|
|
1566
1640
|
scanner: 'sensitive-path-scout',
|
|
1567
1641
|
cvss: {
|
|
@@ -1578,11 +1652,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1578
1652
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1579
1653
|
},
|
|
1580
1654
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED]: {
|
|
1581
|
-
id:
|
|
1655
|
+
id: 574,
|
|
1582
1656
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_TEST_ENDPOINT_EXPOSED,
|
|
1583
1657
|
title: 'Test Endpoint Exposed',
|
|
1584
1658
|
description: 'The application exposes test endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1585
1659
|
severity: 'low',
|
|
1660
|
+
levelId: 4,
|
|
1586
1661
|
category: 'information_disclosure',
|
|
1587
1662
|
scanner: 'sensitive-path-scout',
|
|
1588
1663
|
cvss: {
|
|
@@ -1599,11 +1674,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1599
1674
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1600
1675
|
},
|
|
1601
1676
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED]: {
|
|
1602
|
-
id:
|
|
1677
|
+
id: 575,
|
|
1603
1678
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_STAGING_ENDPOINT_EXPOSED,
|
|
1604
1679
|
title: 'Staging Endpoint Exposed',
|
|
1605
1680
|
description: 'The application exposes staging endpoint exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1606
1681
|
severity: 'low',
|
|
1682
|
+
levelId: 4,
|
|
1607
1683
|
category: 'information_disclosure',
|
|
1608
1684
|
scanner: 'sensitive-path-scout',
|
|
1609
1685
|
cvss: {
|
|
@@ -1620,11 +1696,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1620
1696
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1621
1697
|
},
|
|
1622
1698
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED]: {
|
|
1623
|
-
id:
|
|
1699
|
+
id: 576,
|
|
1624
1700
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_EDITOR_BACKUP_FILE_DETECTED,
|
|
1625
1701
|
title: 'Editor Backup File Detected',
|
|
1626
1702
|
description: 'The application exposes editor backup file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1627
1703
|
severity: 'low',
|
|
1704
|
+
levelId: 4,
|
|
1628
1705
|
category: 'information_disclosure',
|
|
1629
1706
|
scanner: 'sensitive-path-scout',
|
|
1630
1707
|
cvss: {
|
|
@@ -1641,11 +1718,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1641
1718
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1642
1719
|
},
|
|
1643
1720
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED]: {
|
|
1644
|
-
id:
|
|
1721
|
+
id: 577,
|
|
1645
1722
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_VIM_SWAP_FILE_DETECTED,
|
|
1646
1723
|
title: 'VIM Swap File Detected',
|
|
1647
1724
|
description: 'The application exposes vim swap file detected in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1648
1725
|
severity: 'low',
|
|
1726
|
+
levelId: 4,
|
|
1649
1727
|
category: 'information_disclosure',
|
|
1650
1728
|
scanner: 'sensitive-path-scout',
|
|
1651
1729
|
cvss: {
|
|
@@ -1662,11 +1740,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1662
1740
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1663
1741
|
},
|
|
1664
1742
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED]: {
|
|
1665
|
-
id:
|
|
1743
|
+
id: 578,
|
|
1666
1744
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_DIRECTORY_LISTING_ENABLED,
|
|
1667
1745
|
title: 'Directory Listing Enabled',
|
|
1668
1746
|
description: 'The application exposes directory listing enabled in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1669
1747
|
severity: 'low',
|
|
1748
|
+
levelId: 4,
|
|
1670
1749
|
category: 'information_disclosure',
|
|
1671
1750
|
scanner: 'sensitive-path-scout',
|
|
1672
1751
|
cvss: {
|
|
@@ -1683,11 +1762,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1683
1762
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1684
1763
|
},
|
|
1685
1764
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED]: {
|
|
1686
|
-
id:
|
|
1765
|
+
id: 579,
|
|
1687
1766
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_AZURE_STORAGE_CONFIG_EXPOSED,
|
|
1688
1767
|
title: 'AZURE Storage Config Exposed',
|
|
1689
1768
|
description: 'The application exposes azure storage config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1690
1769
|
severity: 'high',
|
|
1770
|
+
levelId: 2,
|
|
1691
1771
|
category: 'information_disclosure',
|
|
1692
1772
|
scanner: 'sensitive-path-scout',
|
|
1693
1773
|
cvss: {
|
|
@@ -1704,11 +1784,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1704
1784
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1705
1785
|
},
|
|
1706
1786
|
[error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED]: {
|
|
1707
|
-
id:
|
|
1787
|
+
id: 580,
|
|
1708
1788
|
code: error_codes_js_1.VulnerabilityCode.SENS_HIGH_MONGO_RC_EXPOSED,
|
|
1709
1789
|
title: 'Mongo Rc Exposed',
|
|
1710
1790
|
description: 'The application exposes mongo rc exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1711
1791
|
severity: 'high',
|
|
1792
|
+
levelId: 2,
|
|
1712
1793
|
category: 'information_disclosure',
|
|
1713
1794
|
scanner: 'sensitive-path-scout',
|
|
1714
1795
|
cvss: {
|
|
@@ -1725,11 +1806,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1725
1806
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1726
1807
|
},
|
|
1727
1808
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED]: {
|
|
1728
|
-
id:
|
|
1809
|
+
id: 581,
|
|
1729
1810
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_AWSSAM_TEMPLATE_EXPOSED,
|
|
1730
1811
|
title: 'Awssam Template Exposed',
|
|
1731
1812
|
description: 'The application exposes awssam template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1732
1813
|
severity: 'low',
|
|
1814
|
+
levelId: 4,
|
|
1733
1815
|
category: 'information_disclosure',
|
|
1734
1816
|
scanner: 'sensitive-path-scout',
|
|
1735
1817
|
cvss: {
|
|
@@ -1746,11 +1828,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1746
1828
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1747
1829
|
},
|
|
1748
1830
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED]: {
|
|
1749
|
-
id:
|
|
1831
|
+
id: 582,
|
|
1750
1832
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_SERVERLESS_CONFIG_EXPOSED,
|
|
1751
1833
|
title: 'Serverless Config Exposed',
|
|
1752
1834
|
description: 'The application exposes serverless config exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1753
1835
|
severity: 'low',
|
|
1836
|
+
levelId: 4,
|
|
1754
1837
|
category: 'information_disclosure',
|
|
1755
1838
|
scanner: 'sensitive-path-scout',
|
|
1756
1839
|
cvss: {
|
|
@@ -1767,11 +1850,12 @@ exports.SENSITIVE_PATH_VULNERABILITIES = {
|
|
|
1767
1850
|
remediation: 'Remove or restrict access to the exposed resource. Store sensitive data outside public web roots, enforce authentication/allowlists, and review deployment pipelines for accidental exposure.',
|
|
1768
1851
|
},
|
|
1769
1852
|
[error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED]: {
|
|
1770
|
-
id:
|
|
1853
|
+
id: 583,
|
|
1771
1854
|
code: error_codes_js_1.VulnerabilityCode.SENS_LOW_CLOUD_FORMATION_TEMPLATE_EXPOSED,
|
|
1772
1855
|
title: 'Cloud Formation Template Exposed',
|
|
1773
1856
|
description: 'The application exposes cloud formation template exposed in a web-accessible location, which can reveal sensitive configuration, credentials, or operational details and enable attackers to further compromise the system or pivot to other assets.',
|
|
1774
1857
|
severity: 'low',
|
|
1858
|
+
levelId: 4,
|
|
1775
1859
|
category: 'information_disclosure',
|
|
1776
1860
|
scanner: 'sensitive-path-scout',
|
|
1777
1861
|
cvss: {
|